Getting to Continuous Authorization to...
One of the most beneficial practices any agency can implement is achieving and maintaining Continuous Authorization to Operate (cATO). It allows an organization to maintain ongoing authorization for their systems and software, rather than having to obtain a one-time ATO for each deployment. Gaining a cATO requires agencies to implement continuous monitoring of the security of their systems and practicing active cyber defense measures that proa...
July 15, 2025
Organizer:
FedInsider Location:
Webcast
Non-Human Identity (NHI) Summit 2025
The rise of non-human identities (NHIs) is reshaping the cloud security landscape. APIs, service accounts, bots, and machine identities now outnumber humans in most cloud environments—and they often hold the keys to your most critical systems. Join global cloud and identity experts for CSA’s first-ever Non-Human Identity Summit, a free, two-day virtual event dedicated to tackling the complex challenges of NHI management. NHI Summit...
HEC-RAS
This course provides an introduction of HEC-RAS with applications to dam safety. The course provides a hands-on opportunity to use the program and resolve specific questions. The objective of this course is to review the basic principles of open channel hydraulics as they relate to the natural stream environment with application to dam safety. Bridges, culverts, and in-line structures will be discussed and both steady and unsteady flow modelin...
Understanding and Navigating the Servic...
OverviewFailure to understand and comply with the McNamara-O’Hara Service Contract Act (SCA), or Service Contract Labor Standards (SCLS) can lead to costly outcomes, withholding of contract funds, and even debarment. Cross-functional (i.e., Human Resources, Contracts, Payroll, Accounting) understanding of the SCA is imperative to successfully administer an SCA contract. Many contractors find SCA confusing and intimidating, which often le...
The Two-Edged Sword of AI in Cybersecurity
Artificial Intelligence (AI) is transforming cybersecurity for the better—empowering teams to detect threats faster, reduce false positives, and identify risky behavior before it becomes a breach. But there are risks associated with AI: first, that AI tools currently are new to organizations and under-regulated for their own cybersecurity, so require careful review; also, as defenders become more sophisticated with those AI tools, so do...
July 16, 2025
Organizer:
Fedinsider Location:
Webcast
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
FLGISA 2025 Annual Conference
We invite you to join us for the Florida Local Government Information Systems Association 2025 Annual Conference at the Signia by Hilton Orlando Bonnet Creek on July 21-24, 2025. The conference is open to all Florida local government agency technology professionals. Benefits of Attending the 2025 Annual Conference:Network with over 350 local government technology leadersLearn about the latest technology and security trends15 hours of CEU credi...
July 21-24, 2025
Organizer:
FLGISA Location:
Orlando, FL
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
SANS 2025 Government Security Forum
Join us at the 2025 Government Security Forum on July 22nd at 10:00 AM ET to gain intelligence, tools, and real-world strategies needed to defend your agency against next-generation cyber threats. AI is reshaping the cyber threat landscape at an unprecedented pace. From AI-enhanced attacks to deepfake-driven disinformation campaigns, government agencies are facing more sophisticated and relentless threats than ever before. At the same time, th...
Cloud Public Safety & Emergency Managem...
Data analytics demonstrate their value for both public safety and emergency management every day. The National League of Cities, for example, promotes the usefulness of Data-Informed Community Engagement (DICE), pairing crime data and analytics with community-driven risk concerns. Data-driven policing has been in use since the 1970s, but the advent of the cloud and edge computing has put it at the fingertips of law enforcement. Similarly, emer...
July 22, 2025
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.